Serveur d'exploration Stress et Covid

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Redefining the Approach to Cybersecurity

Identifieur interne : 000220 ( 2020/Analysis ); précédent : 000219; suivant : 000221

Redefining the Approach to Cybersecurity

Auteurs : Isabella Corradini [Italie]

Source :

RBID : PMC:7189027

Abstract

One of the most critical issues in cybersecurity is represented by social engineering attacks. These threats have been known for years, but it is very difficult to handle them effectively, because they are strictly related to human nature. Social engineering is not just a phishing email; indeed, it is possible to distinguish several forms of attack which combine different elements, from human to social to physical and technological. According to a psychological point of view, social engineering is a powerful means of gaining information exploiting individuals’ weaknesses. Moreover, due to the mechanisms of persuasion, widely studied in literature, it is easy to imagine how complicated the management of this threat is. Appropriate training of employees, especially of key roles of the company, can be an effective antidote to social engineering. Given the current scenario and the future perspective in cybersecurity, it is clear that the approach used to manage cybersecurity requires a radical change. Currently, the preferred cybersecurity strategy is still based on technological solutions, without brilliant results, since cyberthreats keep growing. Many are convinced that Artificial Intelligence (AI) will be an opportunity for managing cybersecurity; whether true or not, it is however evident that AI has also the power to generate new threats and to strengthen the existing ones. Therefore, we should be very prudent when technologies are presented as a miracle solution for cybersecurity problems. The starting point is that technology has to be deployed under full human control. Then, critical thinking is needed to develop alternatives to improve the current approach to cybersecurity. In short, we need to develop a multidisciplinary vision of cybersecurity, involving other disciplines and assuming different perspectives.


Url:
DOI: 10.1007/978-3-030-43999-6_3
PubMed: NONE
PubMed Central: 7189027


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

PMC:7189027

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Redefining the Approach to Cybersecurity</title>
<author>
<name sortKey="Corradini, Isabella" sort="Corradini, Isabella" uniqKey="Corradini I" first="Isabella" last="Corradini">Isabella Corradini</name>
<affiliation wicri:level="3">
<nlm:aff id="Aff3">Themis Research Center, Rome, Italy</nlm:aff>
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Themis Research Center, Rome</wicri:regionArea>
<placeName>
<settlement type="city">Rome</settlement>
<region nuts="2">Latium</region>
</placeName>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmc">7189027</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7189027</idno>
<idno type="RBID">PMC:7189027</idno>
<idno type="doi">10.1007/978-3-030-43999-6_3</idno>
<idno type="pmid">NONE</idno>
<date when="2020">2020</date>
<idno type="wicri:Area/Pmc/Corpus">000024</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000024</idno>
<idno type="wicri:Area/Pmc/Curation">000024</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Curation">000024</idno>
<idno type="wicri:Area/Pmc/Checkpoint">000178</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Checkpoint">000178</idno>
<idno type="wicri:Area/Ncbi/Merge">001414</idno>
<idno type="wicri:Area/Ncbi/Curation">001414</idno>
<idno type="wicri:Area/Ncbi/Checkpoint">001414</idno>
<idno type="wicri:Area/Main/Merge">000220</idno>
<idno type="wicri:Area/Main/Curation">000220</idno>
<idno type="wicri:Area/Main/Exploration">000220</idno>
<idno type="wicri:Area/2020/Extraction">000220</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Redefining the Approach to Cybersecurity</title>
<author>
<name sortKey="Corradini, Isabella" sort="Corradini, Isabella" uniqKey="Corradini I" first="Isabella" last="Corradini">Isabella Corradini</name>
<affiliation wicri:level="3">
<nlm:aff id="Aff3">Themis Research Center, Rome, Italy</nlm:aff>
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Themis Research Center, Rome</wicri:regionArea>
<placeName>
<settlement type="city">Rome</settlement>
<region nuts="2">Latium</region>
</placeName>
</affiliation>
</author>
</analytic>
<series>
<title level="j">Building a Cybersecurity Culture in Organizations</title>
<imprint>
<date when="2020">2020</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p id="Par1">One of the most critical issues in cybersecurity is represented by social engineering attacks. These threats have been known for years, but it is very difficult to handle them effectively, because they are strictly related to human nature. Social engineering is not just a phishing email; indeed, it is possible to distinguish several forms of attack which combine different elements, from human to social to physical and technological. According to a psychological point of view, social engineering is a powerful means of gaining information exploiting individuals’ weaknesses. Moreover, due to the mechanisms of persuasion, widely studied in literature, it is easy to imagine how complicated the management of this threat is. Appropriate training of employees, especially of key roles of the company, can be an effective antidote to social engineering. Given the current scenario and the future perspective in cybersecurity, it is clear that the approach used to manage cybersecurity requires a radical change. Currently, the preferred cybersecurity strategy is still based on technological solutions, without brilliant results, since cyberthreats keep growing. Many are convinced that Artificial Intelligence (AI) will be an opportunity for managing cybersecurity; whether true or not, it is however evident that AI has also the power to generate new threats and to strengthen the existing ones. Therefore, we should be very prudent when technologies are presented as a miracle solution for cybersecurity problems. The starting point is that technology has to be deployed under full human control. Then, critical thinking is needed to develop alternatives to improve the current approach to cybersecurity. In short, we need to develop a multidisciplinary vision of cybersecurity, involving other disciplines and assuming different perspectives.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cialdini, Rb" uniqKey="Cialdini R">RB Cialdini</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Cybenko, G" uniqKey="Cybenko G">G Cybenko</name>
</author>
<author>
<name sortKey="Giani, A" uniqKey="Giani A">A Giani</name>
</author>
<author>
<name sortKey="Thompson, P" uniqKey="Thompson P">P Thompson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Krombholz, K" uniqKey="Krombholz K">K Krombholz</name>
</author>
<author>
<name sortKey="Hobel, H" uniqKey="Hobel H">H Hobel</name>
</author>
<author>
<name sortKey="Huber, M" uniqKey="Huber M">M Huber</name>
</author>
<author>
<name sortKey="Weippl, E" uniqKey="Weippl E">E Weippl</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Kruglanski, Aw" uniqKey="Kruglanski A">AW Kruglanski</name>
</author>
<author>
<name sortKey="Thomson, Ep" uniqKey="Thomson E">EP Thomson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mitnick, Kd" uniqKey="Mitnick K">KD Mitnick</name>
</author>
<author>
<name sortKey="Simon, Wl" uniqKey="Simon W">WL Simon</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mouton, F" uniqKey="Mouton F">F Mouton</name>
</author>
<author>
<name sortKey="Leenen, L" uniqKey="Leenen L">L Leenen</name>
</author>
<author>
<name sortKey="Venter, Hs" uniqKey="Venter H">HS Venter</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Mulligan, Dk" uniqKey="Mulligan D">DK Mulligan</name>
</author>
<author>
<name sortKey="Schneider, Fb" uniqKey="Schneider F">FB Schneider</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Taddeo, M" uniqKey="Taddeo M">M Taddeo</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Xiang, Y" uniqKey="Xiang Y">Y Xiang</name>
</author>
<author>
<name sortKey="Wang, L" uniqKey="Wang L">L Wang</name>
</author>
<author>
<name sortKey="Liu, N" uniqKey="Liu N">N Liu</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Zimmermann, V" uniqKey="Zimmermann V">V Zimmermann</name>
</author>
<author>
<name sortKey="Renaud, K" uniqKey="Renaud K">K Renaud</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<affiliations>
<list>
<country>
<li>Italie</li>
</country>
<region>
<li>Latium</li>
</region>
<settlement>
<li>Rome</li>
</settlement>
</list>
<tree>
<country name="Italie">
<region name="Latium">
<name sortKey="Corradini, Isabella" sort="Corradini, Isabella" uniqKey="Corradini I" first="Isabella" last="Corradini">Isabella Corradini</name>
</region>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Sante/explor/StressCovidV1/Data/2020/Analysis
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000220 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/2020/Analysis/biblio.hfd -nk 000220 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Sante
   |area=    StressCovidV1
   |flux=    2020
   |étape=   Analysis
   |type=    RBID
   |clé=     PMC:7189027
   |texte=   Redefining the Approach to Cybersecurity
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/2020/Analysis/RBID.i   -Sk "pubmed:NONE" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/2020/Analysis/biblio.hfd   \
       | NlmPubMed2Wicri -a StressCovidV1 

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Wed May 6 16:44:09 2020. Site generation: Sun Mar 28 08:26:57 2021